Online Impersonation and Dummy Account Complaints in the Philippines

I. Introduction

Online impersonation has become one of the most common digital harms in the Philippines. It may involve a fake Facebook profile using another person’s name and photo, a dummy account used to harass or defame someone, a scammer pretending to be a company representative, a poser account soliciting money, or an account created to threaten, shame, blackmail, or deceive others.

In Philippine law, “online impersonation” is not always treated as one single offense. Depending on the facts, it may fall under cybercrime, identity theft, libel, unjust vexation, grave threats, coercion, estafa, data privacy violations, violence against women and children, child protection laws, election offenses, consumer protection rules, or administrative and civil remedies.

The legal classification depends on what the dummy account does, what information it uses, who is targeted, whether money or benefit is obtained, whether sexual content is involved, whether threats are made, whether private information is exposed, and whether reputational damage occurs.

This article discusses the Philippine legal framework, possible criminal and civil liabilities, available remedies, evidence preservation, complaint procedure, and practical considerations in online impersonation and dummy account cases.


II. What Is Online Impersonation?

Online impersonation generally refers to the unauthorized use of another person’s identity, name, photograph, likeness, account details, personal data, business name, logo, or other identifying information in an online space.

It may occur through:

  1. Creating a fake social media profile using another person’s name or photograph.
  2. Pretending to be another person in chats, posts, comments, groups, marketplaces, or dating apps.
  3. Using a company’s brand, logo, or representative’s identity to deceive customers.
  4. Creating accounts that mimic public officials, celebrities, teachers, employers, employees, lawyers, doctors, or private individuals.
  5. Using another person’s photos to solicit money, sell products, spread defamatory statements, or engage in harassment.
  6. Creating dummy accounts to avoid accountability while committing threats, libel, harassment, fraud, or blackmail.
  7. Taking over or accessing another person’s real account without authority.

A dummy account is not automatically illegal merely because it does not use a real name. Many people use pseudonyms for privacy, safety, commentary, satire, or creative purposes. Liability usually arises when the account is used to deceive, harm, defame, threaten, extort, scam, violate privacy, or unlawfully use someone’s personal data or identity.


III. Key Philippine Laws That May Apply

A. Cybercrime Prevention Act of 2012

The principal law is Republic Act No. 10175, known as the Cybercrime Prevention Act of 2012.

This law penalizes certain offenses committed through information and communications technology. In impersonation cases, the most relevant provisions are usually:

  1. Computer-related identity theft
  2. Cyber libel
  3. Illegal access
  4. Data interference or system interference
  5. Computer-related fraud
  6. Aiding or abetting cybercrime
  7. Attempted cybercrime

The law also generally increases penalties when traditional crimes under the Revised Penal Code or special laws are committed through ICT.


IV. Computer-Related Identity Theft

Computer-related identity theft is one of the most direct cybercrime offenses relevant to online impersonation.

In simple terms, it involves the intentional acquisition, use, misuse, transfer, possession, alteration, or deletion of identifying information belonging to another person, whether natural or juridical, without right.

A. Elements Usually Considered

A complaint may involve computer-related identity theft where:

  1. The suspect used information that identifies another person or entity.
  2. The use was intentional.
  3. The use was without authority or legal right.
  4. The act was done through a computer system, internet platform, social media account, messaging app, website, or other ICT means.

Identifying information may include a name, photograph, username, account details, contact number, email address, personal image, government ID details, company name, logo, signature, or other data that can identify a person or organization.

B. Examples

Computer-related identity theft may arise where someone:

  1. Creates a Facebook account using another person’s full name and photo.
  2. Pretends to be a business owner and asks customers to send payments.
  3. Uses another person’s identity to send malicious messages.
  4. Uses a teacher’s photo and name to insult students.
  5. Uses a lawyer’s identity to solicit consultation fees.
  6. Creates a fake account using a person’s images to deceive romantic partners.
  7. Uses another person’s identity to register accounts or transact online.

C. Mere Fake Account vs. Identity Theft

A dummy account using a fictional name may not necessarily be identity theft. But a dummy account using the real identity or identifying data of another person may fall under identity theft, especially if the use creates confusion, deception, harm, or unauthorized attribution.


V. Cyber Libel

Online impersonation frequently overlaps with cyber libel.

Cyber libel is libel committed through a computer system or similar means. It is based on the traditional definition of libel under the Revised Penal Code, but committed online.

A. Elements of Libel

Libel generally requires:

  1. A defamatory imputation.
  2. Publication.
  3. Identification of the person defamed.
  4. Malice.

In cyber libel, the publication occurs through online means, such as social media posts, comments, blogs, websites, messaging platforms, online forums, or similar channels.

B. How Dummy Accounts Become Cyber Libel Cases

A dummy account may expose the operator to cyber libel liability if it posts false or defamatory statements identifying a person.

Examples include posts accusing someone of being:

  1. A thief.
  2. A scammer.
  3. An adulterer.
  4. Corrupt.
  5. A criminal.
  6. Diseased in a stigmatizing way.
  7. Sexually immoral.
  8. Professionally incompetent in a malicious and defamatory manner.

A fake account may also be used to make it appear that the victim said defamatory things. In that case, both identity theft and cyber libel may be involved.

C. Identification Requirement

The victim does not always have to be named directly. Identification may exist if the post contains enough details for others to know who is being referred to. Photos, initials, workplace, school, family details, position, tags, screenshots, or contextual clues may be enough.

D. Private Messages

Libel requires publication to a third person. A private message sent only to the victim may not be libel, though it may still be unjust vexation, threats, harassment, coercion, or another offense. If the message is sent to others or posted in group chats, publication may be present.


VI. Online Threats, Harassment, and Coercion

Dummy accounts are often used to threaten, intimidate, or harass victims.

Depending on the content, the conduct may fall under provisions of the Revised Penal Code, such as:

  1. Grave threats — threatening another with a wrong amounting to a crime.
  2. Light threats — threatening harm that may not amount to a grave threat.
  3. Grave coercion — forcing someone to do something against their will, whether lawful or unlawful.
  4. Unjust vexation — conduct that annoys, irritates, torments, or disturbs another without legal justification.
  5. Alarms and scandals — in appropriate public disturbance situations.
  6. Intriguing against honor — certain acts involving gossip or intrigue intended to blemish honor.

When committed online, the Cybercrime Prevention Act may be relevant because ICT was used as the medium.

Examples include:

  1. “I will post your private photos unless you pay me.”
  2. “I will hurt you when I see you.”
  3. “I will destroy your reputation if you do not resign.”
  4. Repeated anonymous messages meant to frighten or emotionally torment the victim.
  5. Dummy accounts tagging, mocking, and humiliating a person repeatedly.

VII. Fraud, Scams, and Estafa Through Fake Accounts

Online impersonation may also constitute fraud.

A common example is someone pretending to be another person, a business, a government office, a bank, a delivery service, a seller, or a company representative to obtain money, goods, account access, or personal information.

A. Estafa

Estafa under the Revised Penal Code may be involved where deceit or abuse of confidence causes damage. When the deceit is committed online, cybercrime provisions may also apply.

Examples:

  1. A fake account pretends to be a relative and asks for emergency money.
  2. A poser seller account uses a real shop’s photos and name but never delivers goods.
  3. A fake company page collects “reservation fees.”
  4. A scammer impersonates a bank representative to obtain OTPs.
  5. A fake recruiter collects placement fees.
  6. A poser account borrows money using another person’s identity.

B. Computer-Related Fraud

Computer-related fraud may apply where computer data or systems are manipulated or used in a fraudulent scheme causing damage or gain.

C. Phishing and Account Takeovers

Where impersonation is used to obtain passwords, OTPs, bank credentials, or account access, other cybercrime provisions may be implicated, including illegal access and misuse of devices or credentials, depending on the facts.


VIII. Data Privacy Implications

The Data Privacy Act of 2012 may apply when personal information is collected, processed, disclosed, or used without authority.

Personal information includes information from which a person’s identity is apparent or can reasonably be ascertained. Sensitive personal information includes data such as age, marital status, health, education, government IDs, sexual life, political affiliation, religious affiliation, and similar protected categories.

A. Privacy Violations in Dummy Account Cases

Possible privacy issues include:

  1. Unauthorized use of photos.
  2. Posting private addresses, phone numbers, IDs, or family details.
  3. Doxxing.
  4. Sharing private messages.
  5. Publishing screenshots containing personal information.
  6. Using someone’s image and identity to create a fake profile.
  7. Collecting personal data through a fake page or phishing account.
  8. Disclosing sensitive personal information to shame or harass someone.

B. National Privacy Commission

A victim may consider filing a complaint with the National Privacy Commission when the issue involves unlawful processing, disclosure, misuse, or exposure of personal data.

However, not every fake account case is automatically a Data Privacy Act case. The facts must show processing or misuse of personal information in a manner covered by the law.


IX. Violence Against Women and Children and Gender-Based Online Abuse

Where the victim is a woman or child, or where the impersonation involves sexual, intimate, or gender-based abuse, additional laws may apply.

A. Anti-Violence Against Women and Their Children Act

Republic Act No. 9262 may apply when an offender who has or had a sexual or dating relationship with a woman uses online impersonation, threats, humiliation, stalking, economic abuse, or psychological abuse against her.

Examples include:

  1. An ex-partner creates fake accounts to harass a woman.
  2. An ex-partner posts or threatens to post intimate information.
  3. An offender uses dummy accounts to monitor, stalk, or intimidate the victim.
  4. Online acts cause emotional anguish or psychological harm in a relationship context.

B. Safe Spaces Act

Republic Act No. 11313, the Safe Spaces Act, addresses gender-based sexual harassment, including online forms. It may apply to gender-based online sexual harassment, misogynistic remarks, sexist slurs, unwanted sexual comments, threats, cyberstalking, and similar acts.

Dummy accounts used for gender-based harassment may fall under this law depending on the nature of the conduct.

C. Anti-Photo and Video Voyeurism Act

Republic Act No. 9995 may apply where intimate photos or videos are recorded, copied, reproduced, shared, or distributed without consent.

If a dummy account posts or threatens to post intimate images, this law may be relevant, along with cybercrime, threats, coercion, extortion, and data privacy laws.

D. Child Protection and Online Sexual Abuse Laws

If the victim is a minor, stricter laws may apply, including child protection statutes and laws against online sexual abuse or exploitation of children. Cases involving minors, sexual content, grooming, coercion, or exploitation are treated with heightened seriousness.


X. Doxxing and Exposure of Personal Information

Doxxing refers to the publication or exposure of a person’s private identifying information, such as address, phone number, school, workplace, family information, government IDs, or private images, usually to harass, intimidate, shame, or endanger the person.

Philippine law does not rely only on the word “doxxing.” The conduct may be prosecuted or complained of under several legal theories, including:

  1. Data Privacy Act violations.
  2. Cybercrime-related offenses.
  3. Grave threats or coercion.
  4. Unjust vexation.
  5. Cyber libel, if defamatory statements are included.
  6. VAWC or Safe Spaces Act, if gender-based or relationship-based.
  7. Civil action for damages.

Doxxing can be especially serious if it exposes the victim to stalking, harassment, threats, identity theft, financial fraud, or physical danger.


XI. Account Hacking and Unauthorized Access

Some impersonation cases involve not merely a fake account but the unauthorized access or takeover of a real account.

This may include:

  1. Logging into someone else’s Facebook, Gmail, Instagram, TikTok, bank, or e-wallet account without permission.
  2. Changing passwords or recovery details.
  3. Sending messages as the victim.
  4. Posting content using the victim’s real account.
  5. Deleting messages or files.
  6. Accessing private photos or communications.

These facts may raise cybercrime issues such as illegal access, data interference, system interference, misuse of devices, identity theft, fraud, or privacy violations.

A hacked account case is often stronger when the victim can show login alerts, password reset notices, unfamiliar devices, recovery email changes, unauthorized posts, screenshots, and platform reports.


XII. Business and Brand Impersonation

Companies, professionals, schools, organizations, and government offices may also be victims of online impersonation.

Examples include:

  1. Fake business pages using a company’s logo.
  2. Fake seller accounts pretending to be a legitimate shop.
  3. Fake customer service accounts.
  4. Fake government assistance pages.
  5. Fake law office, clinic, recruitment, or real estate pages.
  6. Scam pages collecting payments under a business name.

Possible legal remedies may involve:

  1. Cybercrime complaints.
  2. Estafa or fraud complaints.
  3. Trademark or intellectual property claims.
  4. Consumer protection complaints.
  5. Data privacy complaints.
  6. Platform takedown reports.
  7. Civil action for damages and injunction.
  8. Coordination with banks, e-wallets, and payment processors.

For businesses, speed is important because fake pages can rapidly collect money from customers and damage goodwill.


XIII. Political, Public Figure, and Satire Accounts

Not all impersonation-like accounts are illegal. Some accounts may be parody, satire, fan pages, commentary accounts, or anonymous criticism.

The legality depends on whether a reasonable person would be deceived, whether the account clearly disclaims affiliation, whether it uses protected personal information, whether it commits libel, threats, harassment, fraud, or privacy violations, and whether it violates election or platform rules.

A parody account that clearly states it is parody is different from an account pretending to be the real person to deceive the public, solicit funds, spread false statements, or commit reputational harm.

Public figures have less protection from criticism than private individuals in some contexts, but they are still protected against identity theft, threats, fraud, malicious falsehoods, and unlawful use of personal data.


XIV. Civil Liability

Apart from criminal complaints, victims may consider civil remedies.

Possible civil claims may include:

  1. Damages for injury to reputation.
  2. Moral damages for mental anguish, social humiliation, anxiety, or emotional suffering.
  3. Exemplary damages in appropriate cases.
  4. Actual damages, such as lost income, lost business, therapy expenses, or security costs.
  5. Attorney’s fees and litigation expenses.
  6. Injunction or restraining relief in appropriate proceedings.
  7. Civil liability arising from crime.

The Civil Code may support actions where a person’s rights, privacy, dignity, reputation, or peace of mind are unlawfully violated.

Civil cases require proof of damage and causal connection. Screenshots, witness statements, business records, medical or psychological records, demand letters, platform reports, and financial records may become relevant.


XV. Administrative, School, and Workplace Remedies

Not every impersonation incident must begin as a criminal case. Where the offender is a student, employee, professional, public officer, or member of an organization, administrative remedies may also be available.

A. Schools

Schools may discipline students for cyberbullying, impersonation, harassment, threats, or conduct that violates student codes, especially where the conduct affects the school community.

Evidence may be submitted to guidance offices, discipline boards, principals, deans, or school administrators.

B. Workplaces

Employers may investigate employees who create dummy accounts to harass coworkers, disclose confidential information, impersonate the company, damage business reputation, or commit fraud.

Depending on the facts, consequences may include disciplinary action, suspension, termination, civil claims, or criminal complaints.

C. Professionals

Professionals may face administrative complaints before regulatory bodies if online impersonation or dummy account use involves unethical conduct, fraud, harassment, or misuse of professional identity.

D. Public Officers

Public officers using dummy accounts for harassment, intimidation, deception, or misconduct may face administrative, criminal, civil, or ethics-related complaints.


XVI. Evidence in Online Impersonation Cases

Evidence is often the most important issue. Online content can be deleted quickly. Victims should preserve evidence before reporting or confronting the suspect.

A. Useful Evidence

Important evidence may include:

  1. Screenshots of the fake account profile.
  2. Screenshots of posts, comments, messages, stories, reels, or videos.
  3. The profile URL or account link.
  4. Usernames, display names, account IDs, handles, and profile photos.
  5. Date and time of each screenshot.
  6. The full conversation thread, not only selected messages.
  7. Links to posts and comments.
  8. Names of witnesses who saw the content.
  9. Screen recordings showing navigation from the account profile to the offending post.
  10. Platform reports and responses.
  11. Login alerts, password reset emails, and security notifications.
  12. Bank, e-wallet, or payment records in scam cases.
  13. Demand messages or threats.
  14. Medical, psychological, school, or workplace records showing harm.
  15. Barangay blotter, police report, or prior complaints.
  16. Any admission by the suspect.
  17. Metadata, where available.

B. Screenshots Alone

Screenshots are useful, but they may be challenged. To strengthen them, preserve context. Show the URL, username, timestamp, surrounding posts, profile page, and how the content was accessed. A screen recording can help demonstrate that the screenshot was not fabricated.

C. Affidavits

The complainant and witnesses may execute affidavits describing:

  1. How they found the account.
  2. Why they know the victim was identified.
  3. What harm occurred.
  4. Who saw the content.
  5. Why they believe the suspect is responsible, if known.
  6. Whether the suspect admitted the act or used identifying patterns.

D. Cybercrime Lab and Digital Forensics

For serious cases, law enforcement may request preservation, subscriber information, IP logs, or platform data through proper legal channels. Private individuals usually cannot directly compel platforms to disclose account ownership without legal process.


XVII. Identifying the Person Behind a Dummy Account

A major difficulty is proving who operated the fake or dummy account.

The visible profile name is rarely enough. The complainant must connect the account to a real person through evidence.

Possible indicators include:

  1. Admissions or confessions.
  2. Reuse of phone numbers, email addresses, photos, usernames, or profile links.
  3. Consistent writing style, personal knowledge, or references only the suspect would know.
  4. Screenshots showing the suspect logged in.
  5. Witness testimony.
  6. Payment records.
  7. IP logs, device data, or platform records obtained through lawful process.
  8. Prior threats from the same person.
  9. Timing and context connecting the account to the suspect.
  10. Shared recovery email or phone number.
  11. Links to other accounts controlled by the suspect.

Accusing someone without sufficient basis can create legal risk. It is often safer to file a complaint against an unknown person first, then allow investigators to identify the account operator.


XVIII. Reporting to Online Platforms

Victims should usually report the fake account to the platform while preserving evidence first.

A. Common Platform Remedies

Platforms may allow reports for:

  1. Impersonation.
  2. Harassment.
  3. Bullying.
  4. Scam or fraud.
  5. Intellectual property infringement.
  6. Unauthorized use of images.
  7. Privacy violations.
  8. Child safety violations.
  9. Non-consensual intimate images.
  10. Hate speech or threats.

B. Preserve Evidence Before Reporting

Reporting may lead to removal of the account or content. While removal is good for harm reduction, it may also destroy visible evidence. Screenshots, URLs, screen recordings, and witness records should be preserved first.

C. Takedown Is Not the Same as Criminal Liability

A platform takedown does not automatically mean the offender is criminally liable. Conversely, a platform’s refusal to remove content does not necessarily mean the conduct is lawful under Philippine law.


XIX. Where to File Complaints in the Philippines

Depending on the facts, complaints may be filed or reported to:

  1. Philippine National Police Anti-Cybercrime Group.
  2. National Bureau of Investigation Cybercrime Division.
  3. City or provincial prosecutor’s office.
  4. Local police station for blotter or initial report.
  5. Barangay, if appropriate and if the parties are covered by barangay conciliation rules.
  6. National Privacy Commission for data privacy concerns.
  7. School, employer, professional board, or administrative office.
  8. Platform abuse reporting channels.
  9. Bank, e-wallet, or payment provider in fraud cases.
  10. Department of Trade and Industry or other consumer-related agencies for business scams, where relevant.

For criminal prosecution, the complaint typically proceeds through investigation and preliminary investigation where affidavits and supporting evidence are submitted.


XX. Barangay Conciliation

Some disputes between individuals may be subject to barangay conciliation before court proceedings, particularly where parties reside in the same city or municipality and the offense is within the jurisdictional threshold.

However, cybercrime, serious offenses, offenses punishable by higher penalties, cases involving parties in different cities or municipalities, urgent protective remedies, or cases involving public interest may not be appropriate for barangay settlement.

Victims should be careful not to rely solely on barangay proceedings where evidence may disappear or where urgent online harm continues.


XXI. Complaint Preparation

A well-prepared complaint usually contains:

  1. Full name and contact details of the complainant.
  2. Known details of the suspect, or statement that the suspect is unknown.
  3. Description of the fake or dummy account.
  4. URLs, usernames, account names, and screenshots.
  5. Timeline of events.
  6. Explanation of how the account impersonates the victim.
  7. Explanation of harm suffered.
  8. Witness names and statements.
  9. Platform reports.
  10. Financial records, if money was involved.
  11. Medical or psychological records, if emotional harm is claimed.
  12. Prior incidents, threats, or related communications.
  13. Affidavit of complaint.
  14. Affidavits of witnesses.
  15. Request for investigation, preservation, or appropriate legal action.

A clear timeline is especially useful. It should state what happened first, when the account appeared, what it posted, who saw it, what harm resulted, and what steps were taken.


XXII. Sample Timeline Format

A complainant may organize facts this way:

Date Event Evidence
January 5 Victim discovered fake account using her name and photo Screenshot of profile
January 6 Fake account messaged victim’s coworkers Screenshots from coworkers
January 7 Fake account posted defamatory accusation Screenshot and URL
January 8 Victim reported account to platform Report confirmation
January 9 Suspect admitted creating the account Chat screenshot
January 10 Victim filed police report Police blotter

This structure helps investigators and prosecutors understand the case quickly.


XXIII. Remedies in Urgent Cases

Some cases require urgent action, especially where there are threats, stalking, sexual images, child safety issues, financial scams, or ongoing reputational harm.

Possible immediate steps include:

  1. Preserve evidence.
  2. Report the account to the platform.
  3. Secure personal accounts and change passwords.
  4. Enable two-factor authentication.
  5. Warn friends, customers, or contacts if the fake account is soliciting money.
  6. Report bank or e-wallet accounts used by scammers.
  7. File a report with cybercrime authorities.
  8. Seek protection orders where applicable.
  9. Request assistance from school, employer, or barangay security if physical safety is at risk.
  10. Consult counsel for demand letters, injunctions, or criminal complaints.

In intimate image or child safety cases, speed is critical because content can spread rapidly.


XXIV. Defenses and Limitations

A person accused of online impersonation may raise defenses depending on the charge.

Possible defenses include:

  1. No impersonation occurred.
  2. The account was parody, satire, commentary, or fan content.
  3. The account did not use identifying information of the complainant.
  4. The accused did not create or control the account.
  5. The accused’s own account was hacked.
  6. The statements were true or privileged, in libel-related cases.
  7. There was no malice.
  8. There was no publication to a third person.
  9. There was no damage or fraudulent gain.
  10. The complainant consented to the use of the photo or identity.
  11. The evidence is fabricated, incomplete, or unauthenticated.
  12. The complaint was filed against the wrong person.

Because anonymous accounts are easy to create, proof of authorship is often contested.


XXV. Special Considerations for Minors

When minors are involved, the approach changes.

If a minor is the victim, child protection laws and school intervention may be important. If a minor is the alleged offender, juvenile justice rules may apply. Schools, parents, guardians, social workers, and child protection authorities may become involved.

Cyberbullying through fake accounts can cause serious psychological harm. Evidence should be preserved, but adults should avoid escalating the matter through public shaming of minors.


XXVI. Employment and Workplace Impersonation

Dummy accounts in the workplace may involve:

  1. Harassment of coworkers.
  2. Fake accounts pretending to be management.
  3. Disclosure of confidential information.
  4. Defamation of employees or the company.
  5. Fraud against customers.
  6. Fake recruitment accounts.
  7. Misuse of company logos or email identities.

Employers should conduct fair investigation, preserve evidence, avoid unlawful surveillance, comply with data privacy obligations, and observe due process before imposing discipline.

Employees who are victims may report to HR, management, cybercrime authorities, or labor-related offices depending on the facts.


XXVII. Schools and Cyberbullying

Fake accounts are frequently used in school settings to shame classmates, teachers, or administrators.

Possible remedies include:

  1. Reporting to the class adviser, guidance office, discipline office, dean, principal, or school head.
  2. Preserving screenshots and links.
  3. Requesting school intervention.
  4. Filing cybercrime or child protection complaints in serious cases.
  5. Seeking counseling support.
  6. Avoiding retaliation or public exposure that worsens the harm.

Schools may impose disciplinary measures if the conduct violates student rules, even if it occurred outside campus, especially where it affects school order, safety, or welfare.


XXVIII. Public Posts, Group Chats, and Private Chats

The legal treatment may differ depending on where the conduct occurred.

A. Public Posts

Public posts are easier to prove as publication. They may support cyber libel, harassment, privacy, or identity theft claims depending on content.

B. Group Chats

Group chats may also satisfy publication if defamatory statements are sent to third persons. Screenshots from group members and identification of participants are useful.

C. Private Messages

Private one-on-one messages may not be libel if sent only to the victim, but they may still be threats, unjust vexation, coercion, harassment, extortion, or evidence of identity theft.

D. Disappearing Messages

Disappearing messages should be documented quickly. Screen recordings, witness affidavits, and device preservation may matter.


XXIX. Demand Letters

A victim may send a demand letter or cease-and-desist letter before filing a complaint, but this is not always advisable.

A demand letter may be useful where:

  1. The offender is known.
  2. The goal is removal, apology, or settlement.
  3. The harm is not immediately dangerous.
  4. The victim wants to preserve the possibility of civil resolution.

A demand letter may be risky where:

  1. The offender may delete evidence.
  2. The offender is violent or threatening.
  3. The case involves child exploitation or intimate images.
  4. The offender is unknown.
  5. Immediate law enforcement intervention is needed.

Demand letters should be carefully drafted to avoid defamation, unlawful threats, or premature accusations without evidence.


XXX. Platform Takedown Requests and Legal Complaints Can Proceed Together

Victims often wonder whether they should report to the platform first or file a legal complaint first.

Both may be pursued, but sequencing matters. Evidence should be preserved before takedown requests. Once documented, the victim may report the content for removal while still filing a legal complaint.

For scam or business impersonation cases, public advisories may also be issued. These should be factual and carefully worded, such as: “We are not connected with this page. Please transact only through our official channels.”


XXXI. Account Security Measures for Victims

Victims should also protect themselves technically.

Recommended measures include:

  1. Change passwords.
  2. Use strong unique passwords.
  3. Enable two-factor authentication.
  4. Review logged-in devices.
  5. Remove unknown recovery emails or phone numbers.
  6. Secure email accounts first, because email controls password recovery.
  7. Warn close contacts not to transact with fake accounts.
  8. Review privacy settings.
  9. Report cloned accounts.
  10. Monitor bank and e-wallet accounts.
  11. Save security alerts.
  12. Avoid clicking suspicious links.
  13. Preserve phishing messages.

Legal action is stronger when combined with immediate harm reduction.


XXXII. Common Mistakes by Complainants

Victims often weaken their cases unintentionally.

Common mistakes include:

  1. Reporting the fake account before saving evidence.
  2. Posting accusations publicly without proof.
  3. Editing screenshots.
  4. Saving only cropped images.
  5. Failing to record URLs.
  6. Deleting conversations.
  7. Confronting the suspect too early.
  8. Not documenting dates and times.
  9. Filing only a platform report and assuming that is enough.
  10. Not identifying witnesses who saw the posts.
  11. Ignoring financial records in scam cases.
  12. Using retaliatory dummy accounts.
  13. Threatening the suspect unlawfully.
  14. Sharing intimate images further as “proof.”
  15. Waiting too long while content disappears.

XXXIII. Common Mistakes by Accused Persons

Persons accused of operating dummy accounts also make mistakes.

These include:

  1. Deleting content after being confronted, which may look suspicious.
  2. Admitting partial involvement casually in chat.
  3. Continuing to post.
  4. Threatening the complainant.
  5. Creating more accounts.
  6. Asking others to harass the complainant.
  7. Claiming “joke lang” despite serious harm.
  8. Assuming anonymity prevents investigation.
  9. Using the same phone number, email, device, or payment account.
  10. Ignoring subpoenas or notices.

Even if the original act was minor, continued harassment or cover-up behavior may worsen liability.


XXXIV. Evidence Authentication in Court

Electronic evidence must be authenticated. The rules on electronic evidence recognize digital documents and communications, but the party presenting them must show that they are what they claim to be.

Authentication may involve:

  1. Testimony of the person who captured the screenshot.
  2. Explanation of how the screenshot was obtained.
  3. Device used.
  4. Date and time.
  5. URL or account details.
  6. Confirmation by witnesses.
  7. Platform records.
  8. Forensic examination.
  9. Consistency with other evidence.
  10. Admissions by the accused.

Courts and prosecutors evaluate credibility, completeness, chain of custody, and relevance.


XXXV. Prescription and Timing

The time to file depends on the offense charged. Different offenses have different prescriptive periods. Libel, cyber libel, unjust vexation, threats, estafa, data privacy offenses, and special law violations may have different timelines.

Victims should act promptly because:

  1. Online evidence may be deleted.
  2. Platforms may retain logs only for limited periods.
  3. Witness memory fades.
  4. Fake accounts may change usernames.
  5. Financial trails may become harder to trace.
  6. Delay may affect credibility.

XXXVI. Possible Penalties

Penalties depend on the offense. Cybercrime offenses may carry imprisonment and fines. When a crime under the Revised Penal Code or special law is committed through ICT, penalties may be higher under the cybercrime framework.

Possible consequences include:

  1. Imprisonment.
  2. Fines.
  3. Civil damages.
  4. Takedown orders or removal.
  5. Administrative sanctions.
  6. School discipline.
  7. Employment termination.
  8. Professional discipline.
  9. Account suspension.
  10. Restitution in scam cases.
  11. Protective orders in appropriate cases.

The exact penalty depends on the charge, applicable law, evidence, aggravating or mitigating circumstances, and court findings.


XXXVII. Distinguishing Legal Categories

The same fake account can create multiple legal issues.

Example 1: Fake Account Using Name and Photo Only

Possible issue: identity theft or privacy violation, depending on use.

Example 2: Fake Account Posts “She is a thief”

Possible issues: identity theft and cyber libel.

Example 3: Fake Account Asks Victim’s Friends for Money

Possible issues: identity theft, estafa, computer-related fraud.

Example 4: Fake Account Threatens to Release Intimate Images

Possible issues: grave threats, coercion, extortion, Anti-Photo and Video Voyeurism Act, VAWC, Safe Spaces Act, cybercrime, data privacy.

Example 5: Fake Business Page Collects Customer Payments

Possible issues: business impersonation, estafa, computer-related fraud, trademark violation, consumer protection, cybercrime.

Example 6: Anonymous Account Criticizes a Public Official

Possible issues: may be protected commentary unless it crosses into libel, threats, fraud, identity theft, or unlawful disclosure of personal information.


XXXVIII. Practical Complaint Strategy

A strong complaint should answer these questions clearly:

  1. What account is involved?
  2. What exactly did it do?
  3. Whose identity was used?
  4. What personal information was used?
  5. Was the use authorized?
  6. Who saw the content?
  7. Was anyone deceived?
  8. Was money obtained?
  9. Was the victim threatened?
  10. Was the victim defamed?
  11. Was private information exposed?
  12. Is there evidence linking the account to a real person?
  13. What harm resulted?
  14. What remedy is sought?

The complaint should avoid vague statements like “I was cyberbullied” without details. It should state specific acts, dates, screenshots, links, and consequences.


XXXIX. Sample Complaint Narrative

A basic narrative may look like this:

On or about [date], I discovered a Facebook account using my full name and personal photograph without my consent. The account used the name “[account name]” and the profile link was [URL]. I did not create or authorize this account.

The account sent messages to my friends and coworkers stating that I was asking for money. Several recipients believed the account was mine. Screenshots of the account, messages, and recipient responses are attached.

On [date], the account also posted statements accusing me of being a scammer. These statements are false and were seen by my coworkers and relatives. As a result, I suffered humiliation, anxiety, and reputational harm.

I respectfully request investigation for possible computer-related identity theft, cyber libel, fraud, and other offenses supported by the evidence.

This is only a structural example. Actual complaints should be tailored to the facts.


XL. Preventive Measures

Individuals and businesses can reduce impersonation risks by:

  1. Keeping official accounts verified where possible.
  2. Publishing official contact channels.
  3. Avoiding public exposure of personal IDs and sensitive information.
  4. Watermarking business images when appropriate.
  5. Monitoring fake pages.
  6. Educating customers not to pay unofficial accounts.
  7. Using strong account security.
  8. Maintaining records of official communications.
  9. Responding quickly to reports of fake accounts.
  10. Avoiding oversharing personal information publicly.

XLI. Legal and Ethical Balance

Philippine law must balance protection from impersonation with freedom of expression, privacy, satire, anonymous speech, and legitimate criticism.

Not every anonymous or dummy account is unlawful. But anonymity is not a license to defame, threaten, deceive, extort, harass, exploit, or steal another person’s identity.

The more the account uses another person’s real identifying information, causes confusion, seeks money, spreads false accusations, exposes private information, or threatens harm, the stronger the legal basis for complaint.


XLII. Conclusion

Online impersonation and dummy account complaints in the Philippines require careful legal classification. The same act may involve computer-related identity theft, cyber libel, fraud, threats, coercion, unjust vexation, data privacy violations, gender-based online harassment, child protection issues, civil damages, or administrative liability.

The strongest cases are built on preserved evidence, clear timelines, properly authenticated screenshots or recordings, witness statements, URLs, platform records, and proof of harm. Victims should document first, report carefully, secure their accounts, avoid public retaliation, and file with the appropriate authority based on the facts.

A dummy account is not illegal simply because it is anonymous. It becomes legally actionable when it is used to impersonate, deceive, defame, threaten, harass, exploit, scam, expose private information, or otherwise violate rights protected under Philippine law.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.